messages from 2019-08-29 23:29:59 to 2019-09-08 22:11:49 UTC [more...]
[PATCH bpf-next v10 00/10] Landlock LSM: Toward unprivileged sandboxing
2019-09-08 22:09 UTC (5+ messages)
` [PATCH bpf-next v10 06/10] bpf,landlock: Add a new map type: inode
[PATCH v3] KEYS: trusted: correctly initialize digests and fix locking issue
2019-09-08 17:45 UTC
[PATCH 1/3] ima: keep the integrity state of open files up to date
2019-09-08 17:07 UTC (8+ messages)
` [PATCH 2/3] ima: update the file measurement on truncate
` [PATCH 3/3] ima: update the file measurement on writes
[PATCH] tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts
2019-09-07 21:21 UTC (3+ messages)
[PATCH v2] KEYS: trusted: correctly initialize digests and fix locking issue
2019-09-07 19:03 UTC (3+ messages)
[PATCH v2 0/5] Add support for O_MAYEXEC
2019-09-06 22:44 UTC (33+ messages)
` [PATCH v2 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
` [PATCH v2 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount propertie
` [PATCH v2 3/5] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
` [PATCH v2 4/5] selftest/exec: Add tests for O_MAYEXEC enforcing
` [PATCH v2 5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl
[PATCH 00/11] Keyrings, Block and USB notifications [ver #8]
2019-09-06 21:19 UTC (36+ messages)
` [PATCH 01/11] uapi: General notification ring definitions "
` [PATCH 02/11] security: Add hooks to rule on setting a watch "
` [PATCH 03/11] security: Add a hook for the point of notification insertion "
` [PATCH 04/11] General notification queue with user mmap()'able ring buffer "
` [PATCH 05/11] keys: Add a notification facility "
` [PATCH 06/11] Add a general, global device notification watch list "
` [PATCH 07/11] block: Add block layer notifications "
` [PATCH 08/11] usb: Add USB subsystem "
` [PATCH 09/11] Add sample notification program "
` [PATCH 10/11] selinux: Implement the watch_key security hook "
` [PATCH 11/11] smack: Implement the watch_key and post_notification hooks "
` Why add the general notification queue and its sources
[PATCH v8 00/28] LSM: Module stacking for AppArmor
2019-09-06 13:46 UTC (19+ messages)
` [PATCH v8 02/28] LSM: Infrastructure management of the sock security
` [PATCH v8 13/28] LSM: Use lsmblob in security_cred_getsecid
` [PATCH v8 15/28] LSM: Specify which LSM to display
` [PATCH v8 16/28] LSM: Ensure the correct LSM context releaser
` [PATCH v8 17/28] LSM: Use lsmcontext in security_secid_to_secctx
` [PATCH v8 18/28] LSM: Use lsmcontext in security_dentry_init_security
` [PATCH v8 19/28] LSM: Use lsmcontext in security_inode_getsecctx
` [PATCH v8 20/28] LSM: security_secid_to_secctx in netlink netfilter
` [PATCH v8 21/28] NET: Store LSM netlabel data in a lsmblob
` [PATCH v8 22/28] SELinux: Verify LSM display sanity in binder
` [PATCH v8 23/28] Audit: Add subj_LSM fields when necessary
` [PATCH v8 24/28] Audit: Include object data for all security modules
` [PATCH v8 25/28] LSM: Provide an user space interface for the default display
` [PATCH v8 26/28] NET: Add SO_PEERCONTEXT for multiple LSMs
` [PATCH v8 27/28] LSM: Add /proc attr entry for full LSM context
` [PATCH v8 28/28] AppArmor: Remove the exclusive flag
[PATCH] selinux: fix residual uses of current_security() for the SELinux blob
2019-09-05 20:55 UTC (8+ messages)
[PATCH] lsm: remove current_security()
2019-09-05 20:26 UTC (3+ messages)
general protection fault in smack_socket_sendmsg
2019-09-04 21:07 UTC (3+ messages)
[PATCH] KEYS: trusted: correctly initialize digests and fix locking issue
2019-09-04 17:23 UTC
[PATCH V40 03/29] security: Add a static lockdown policy LSM
2019-09-04 16:57 UTC (10+ messages)
` [PATCH V40 00/29] Add kernel lockdown functionality
` [PATCH V40 04/29] lockdown: Enforce module signatures if the kernel is locked down
` [PATCH V40 08/29] kexec_file: split KEXEC_VERIFY_SIG into KEXEC_SIG and KEXEC_SIG_FORCE
` [PATCH V40 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
Should PCI "new_id" support be disabled when kernel is locked down?
2019-09-04 16:47 UTC (2+ messages)
[PATCH 00/11] Keyrings, Block and USB notifications [ver #7]
2019-09-04 15:17 UTC (44+ messages)
` [PATCH 01/11] uapi: General notification ring definitions "
` [PATCH 02/11] security: Add hooks to rule on setting a watch "
` [PATCH 03/11] security: Add a hook for the point of notification insertion "
` [PATCH 04/11] General notification queue with user mmap()'able ring buffer "
` [PATCH 05/11] keys: Add a notification facility "
` [PATCH 06/11] Add a general, global device notification watch list "
` [PATCH 07/11] block: Add block layer notifications "
` [PATCH 08/11] usb: Add USB subsystem "
` [PATCH 09/11] Add sample notification program "
` [PATCH 10/11] selinux: Implement the watch_key security hook "
` [PATCH 11/11] smack: Implement the watch_key and post_notification hooks [untested] "
` watch_queue(7) manpage
` watch_devices(2) manpage
` keyctl_watch_key.3 manpage
[PATCH] Smack: Move request_buffer from stack to smack_audit_data
2019-09-03 20:56 UTC (2+ messages)
[PATCH AUTOSEL 4.19 123/167] apparmor: reset pos on failure to unpack for various functions
2019-09-03 16:24 UTC
[PATCH v22 13/24] x86/sgx: Add provisioning
2019-09-03 14:26 UTC
KASAN: use-after-free Read in tomoyo_realpath_from_path
2019-09-03 6:52 UTC (10+ messages)
` [PATCH] tomoyo: Don't check open/getattr permission on sockets
` [PATCH v2] "
[PATCH] keys: Fix missing null pointer check in request_key_auth_describe()
2019-09-02 12:37 UTC
[PATCH 1/2] staging: comedi: Restrict COMEDI_DEVCONFIG when the kernel is locked down
2019-09-02 9:26 UTC (5+ messages)
` [PATCH 2/2] mtd: phram,slram: Disable "
[RFC/RFT v4 0/5] Add generic trusted keys framework/subsystem
2019-09-02 5:07 UTC (6+ messages)
` [RFC/RFT v4 5/5] KEYS: trusted: Add generic trusted keys framework
[PATCH] netlabel: remove redundant assignment to pointer iter
2019-09-01 18:45 UTC (6+ messages)
[PATCH 1/2] rtnetlink: gate MAC address with an LSM hook
2019-08-30 21:46 UTC (6+ messages)
[RFC PATCH] audit, security: allow LSMs to selectively enable audit collection
2019-08-30 21:36 UTC (4+ messages)
general protection fault in smack_socket_sendmsg
2019-08-30 19:40 UTC
[PATCH] tpm_tis: Fix interrupt probing
2019-08-30 17:00 UTC (8+ messages)
[PATCH] keys: ensure that ->match_free() is called in request_key_and_link()
2019-08-30 15:52 UTC
[PATCH 02/10] vfs: syscall: Add move_mount(2) to move mounts around
2019-08-30 10:11 UTC (12+ messages)
` [RFC][PATCH] fix d_absolute_path() interplay with fsmount()
[PATCH V40 23/29] bpf: Restrict bpf when kernel lockdown is in confidentiality mode
2019-08-20 0:17 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).